Atif Ghaffar [6]

Realtime data mirroring on LinuxThis article will explain on how to set an inexpensive real.time data replication system on Linux without need of special hardware. This kind of replication will be especially useful for ISPs or webhosts.

Building Scalable ISPs with opensource softwaresIn my last article, I introduced you to using LDAP on Linux. In this article, we will build a scalable ISP that can scale from one to any number of backend machines. The backbone of setting up this ISP is LDAP.

Ben Y. Yoshino [1]

Mastering the VI editorThe VI editor is a screen-based editor used by many Unix users. The VI editor has powerful features to aid programmers, but many beginning users avoid using VI because the different features overwhelm them.

Bob Smith [2]

Talking to a Running ProcessRun Time Access is a library that lets you view the data structures in your program as tables in a PosgreSQL database or as files in a virtural file system (similar to /proc).

Charles Vidal [5]

An Introduction to TkThis articles explain how to build a graphical interface using the Toolkit of Tcl: Tk. The reader should also appreciate the simplicity of this toolkit compared to usual X-Windows libraries.

Christian Van Caillie [1]

Ximian Evolution installation guideXimian Evolution is able to read ans send mail from a Linux workstation via an Exchange server 5. In this article, I'll give you some info about my personal experiance and my own configuration.

Dr. B. Thangaraju [1]

Fail Safe Port Allocation for Linux Device DriversWriting a device driver is a challenging and an adventurous job. Once the device is registered in the driver's init_module routine, the resources for the device should be allocated. One of the main resources for the device is I/O port. The dynamically linked drivers, the developer should be careful to allocate unused range of port addresses for their device.

Analyzing your internet applications' logfilesThis article is the first in a series about using Lire to analyze log files of internet server applications. This is not limited to one service, e.g. Apache, but is an integrated analyzer for many different services. Included are DNS, WWW, email and ipfilter services.

Reporting bugs on Debian 2.2How that Debian 2.2 is released, a lot of people will upgrade to new newest Debian distro. Since Debian is extremely stable, why do you need a bug report tool? I do not know, but you cannot write software without bugs, so bugs will be found. This article explains how to submit them to the developers of the package.

Making PDF documents with DocBookThis article describes how you can use DocBook to develop PDF documents and covers tools you need to edit DocBook articles and tools to translate them to PDF documents.

Eric Seigne [2]

Samba ConfigurationThis article describes the configuration of Linux-samba, a server needed to control domains of networks based on MS-windows machines. Examples given here are based on Debian GNU/Linux and Samba 2.0.7

Floris Lambrechts [3]

Interview with Jeff DikeJeff Dike is the creator and maintainer of User Mode Linux, a very interesting new feature of the 2.6 Linux kernel. This article will give some insight into UML and the people behind it.

Mozilla dissectedIn this article we dissect the huge lizard - in particular we investigate the browser part. It's actually a review of Mozilla 1.1 with two add-ons: 'Mouse Gestures' and 'RadialContext'.

Frédéric Raynal [14]

Root-kit and integrityThis article presents the different operations a cracker can do after having succeeded in entering a machine. We will also discuss what an administrator can do to detect that the machine has been jeopardized.

Security Holes - part IIThis second article is not directly related with the subject of the series. It reviews some concepts before describing the fear of all the system administrators:Buffer Overflows. We shall see how the memory is organized as well as the stack and how a function call is performed. Then we present a tool used for every intrusion attempt: shellcode.

Security Holes - part IThis is the first article of a series of articles on security holes that can appear within a program. The series will show how to avoid security holes if programming habits are slightly corrected. We shall first discuss privileges, UID and EUID in this first article before dealing with the execution of external commands.

xinetd - extended Internet services daemonxinetd - extended Internet services daemon - provides an excellent security against the intrusions, and limit certain risks of attacks by Deny of Services ( DoS ). It allows, just like the most known pair ( inetd + tcpd ), to set access control to a computer, but its capacities extend well beyond. This article proposes you to discover them.

Bastille LinuxAvailable by the beginning of june,version 1.1 of Bastille-Linux is not a new Linux Distribution but a set of security scripts. The authors have adopted a very pedagogic approach and one can learn a lot simply installing these scripts.

Network File System (NFS)Network File System (NFS) is a tool to manage files spread among several computers on a network as if they were on the same local machine. So, the final user does not have to worry of the exact location of its own files in order to access them.

Yellow Pages (Part II)My previous article was an introduction to the yellow pages and RPCs. This one explains how to configure a NIS client, how this client works and a small introduction to the different tools coming with NIS. Finally, we'll have a few words about NIS+

Yellow PagesThe Network Information Service (NIS) manages a data base on server. Each computer on a network running a NIS client NIS can then poll the server for informations (login name,password, users and groups informations, ...).

GWorkspace, the GNUstep Workspace ManagerThe concept of Workspace Manager appeared with NeXT at the end of the 80's. It was a complete new way of using a system GUI. GWorkspace is the GNUstep free implementation of this revolution.

FSViewer, a File Manager for WindowMakerAmong the revolutionary tools of NeXTStep, the first in order of appearance on the screen was indisputably the File Viewer. Thanks to the path-view in that File Manager you always knew where you were. It was more than a manager, it was a true browser. FSViewer is a NeXTStep a like File Manager for WindowMaker.

Professional Tex(t)Authoring with LyXThis article is written for people who have a lot of text editing/authoring to do and are primarily interested in getting the text edited fast, reliable with a plesant looking printout.

A digital DC power supplyA very small an really powerful DC power supply for your hobby lab. It has lots of features which you normally find only in very expensive power supplies. This one is however cheap, small and easy to build.

uucpssh.org: UUCP e-mail for Linux fansIn the windows world incomming mails are received via POP3 or IMAP and outgoing mails are sent directly via SMTP. This split setup can cause all kind of headaches especially if you are using different ISPs all the time.

Linux on the desktop: A computer for MomMy Mom belongs to a generation which grew up without computers. This article is probably valid for most people who first started to use a computer beyond the age of 60.

Using different ISPs for your Internet accessIn this article we develop configuration files to easily change between a number of different Internet Service Providers. We extend the configuration not only to one PC but to a whole network using IP masquerading. A DNS proxy will be used to make the changing DNS IP addresses invisible inside the masqueraded network.

File Access PermissionsThis article is divided into two parts: The first part (Basic file access permissions) is a very short introduction to the basic file permission concept under Unix. The second part (T-bit, SUID and SGID) covers more advanced features of Linux that go beyond the basic "read-write-execute" flags.

StarOffice for LinuxThis article reviews the applications available in the suite StarOffice 4.0. The author gives us a demonstration using tool for the creation of presentations. (functionally similar to Microsoft's Power Point).

Javi Polo [1]

TCPD and Firewalls using IPFWADMThis article describes very briefly how to configure the inetd services in order to improve security on your system. We concentrate in the of the tool IPFWADM to administer and configure inetd services

Jeffry Degrande [2]

Slackware 7.0 part II: Configuration GuideAfter the installation in the first part, the author now describes some basic configuration tasks in his now favorite Linux distribution. He explains how to configure X, how to compile a kernel (and how to use it with lilo), how to do user account management, how to dial in to internet and how to give your system some basic security.

John Kirch [1]

Microsoft Windows NT Server 4.0 versus UNIXThe goal of this article is provide managers in corporations with the data and comparisons necessary to make well-informed decisions concerning the installation of servers for the corporate environment. All the information presented in this article summarizes the experience of a number of information systems professionals.

Programming with Java. Part IThis is the first article in a series about Java programming. The first part will describe Java as a language, its general characteristics and the location of the most relevant sources of information.

Jürgen Pohl [1]

Statistics Anyone?Most statistics packages seem to be overwhelming in their scope, forcing the user on a very steep learning path, most of them are also very expensive. There is however a refreshing alternative: SalStat

Going 3D with Blender: Very first StepsBlender is an open source 3D graphics program. In this first article in a series about Blender we look at the very basics and build a stage with sphere and cube on it.

Fighting against SpamSpam between the mail!? Spam E-mail is growing at an alarming rate and it is a major problem for almost everybody.In this article we will explain ho w to handle unwanted commercial email.

Concurrent programming - Message queues (2)This series of articles has the purpose of introducing the reader to the concept of multitasking and to its implementation in the Linux operating system. Starting from the theorical concepts at the base of multitasking we will end up writing a complete application demonstrating the communication between processes, with a simple but efficient communication protocol.

Mario M. Knopf [4]

CheckinstallCheckinstall is utility to automatically build RPM/Debian/Slackware packages from tar.gz source pages. This makes it possible to do a "clean" installation and de-installation of almost any source code tar.gz package.

vsftpd - an introduction to the Very Secure FTP DaemonThis article gives a basic introduction to the "Very Secure FTP Daemon". I am beginning with a general description of FTP and vsftpd. After that we will have a look at the installation, configuration and start options of the vsftp daemon.

GLUT programming:Windows and AnimationsGLUT is the GL Utility Toolkit, developed by Mark Kilgard. In this article the author introduces GLUT, and gives us a primer on Windows and Animations handling with GLUT.

Real-time mp3 recording, part IIIn the first part we showed how you can record in mp3 in realtime, for example a radio show, and make a big file out of it, e.g. 650MB for 24 hours of music in near-CD quality (128 kbit/s; stereo). Now, what to do with such a big file? Can we make even bigger files, or could we maybe get a better compression rate? How about the quality of these mp3 recordings?

Ralf Wieland [4]

Faulty SoftwareControversial discussions have started around estimates about the number of faults which a given software has. Often the fault-density is used as a measure for the quality of software. Is that correct?

Vincente Egea [2]

Installation and Configuration of a Raid-systemRAID (Redundant Array of Inexpensive Disks) consists of a series of systems to organize several disk drives into a single entity that behaves as a single virtual drive but making the various disks work in parallel thus improving the access performance and saving the information stored from accidental crashes.

Sketch, vectorial drawing under LinuxThe advantages of a vectorial representation over bitmap is that files are smaller and the image can be enlarged significantly without differences in rendering (pixellisation). Sketch is written in Python, an object oriented interpreted programming language.